EP2927808A1 - Procédé et dispositif de détermination d'application - Google Patents

Procédé et dispositif de détermination d'application Download PDF

Info

Publication number
EP2927808A1
EP2927808A1 EP15152653.0A EP15152653A EP2927808A1 EP 2927808 A1 EP2927808 A1 EP 2927808A1 EP 15152653 A EP15152653 A EP 15152653A EP 2927808 A1 EP2927808 A1 EP 2927808A1
Authority
EP
European Patent Office
Prior art keywords
execution
file
storage unit
program
correction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP15152653.0A
Other languages
German (de)
English (en)
Inventor
Hikaru Hashimoto
Junpei Maehama
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Publication of EP2927808A1 publication Critical patent/EP2927808A1/fr
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/658Incremental updates; Differential updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/865Monitoring of software

Definitions

  • the embodiments discussed herein are related to an application determination method and an application determination device for a correction file.
  • a patch including a library including the corrected function is provided.
  • Patent Document 1 International Publication No. 2007/105274
  • the file configuration of the software may change, and the usage status of a memory by the software may change. Due to this change, the operations of a function that has been normally operating, may become unstable.
  • a non-transitory computer-readable recording medium stores an application determination program for a correction file, wherein the application determination program causes a computer to execute a process, the process including storing, in a storage unit, execution history of each of a plurality of programs included in an execution file; and determining whether to apply a correction file according to whether the storage unit stores execution history that matches a predetermined condition, as execution history of at least one of the plurality of programs included in the execution file, when changing the at least one of the plurality of programs by applying the correction file used for correcting the execution file.
  • FIG. 1 illustrates a configuration example of an information processing system according to an embodiment of the present invention.
  • a patch management server 20 and at least one information processing device 10 are connected via a network such as a LAN (Local Area Network) or the Internet.
  • LAN Local Area Network
  • the information processing device 10 is a computer including software to be the application target of a patch.
  • This software may be any one of an OS (Operating System), middleware, and an application.
  • the information processing device 10 may be a server device for providing a service to a client device connected via the network, or a client device.
  • a mobile phone, a smartphone, or a tablet type terminal may be the information processing device 10.
  • the patch management server 20 is a computer for managing a patch for the software installed in the information processing device 10.
  • a patch means data including files, in which bugs have been corrected, among a group of files constituting the software. For example, when bug correction has been performed on some of the programs among the programs included in an execution file constituting the software, the execution file including the corrected program constitutes the patch.
  • an execution file is a file that causes the CPU of the information processing device 10 to execute a process.
  • the execution file does not only include a file of an execution format, but also includes a file that is an assembly of functions, such as a library.
  • FIG. 2 illustrates an example of a hardware configuration of the information processing device 10 according to an embodiment of the present invention.
  • the information processing device 10 of FIG. 2 includes a drive device 100, a secondary storage device 102, a memory device 103, a CPU 104, and an interface device 105, which are interconnected by a bus B.
  • Programs for realizing processes by the information processing device 10 are provided by a recording medium 101.
  • the recording medium 101 recording a program is set in the drive device 100, the program is installed in the secondary storage device 102 from the recording medium 101 via the drive device 100.
  • the program need not always be installed from the recording medium 101; the program may be downloaded from another computer via the network.
  • the secondary storage device 102 stores the installed programs and also files and data needed for the programs.
  • the memory device 103 reads a program from the secondary storage device 102 and stores the program, when an instruction to activate the program is given.
  • the CPU 104 executes a function relevant to the information processing device 10 according to a program stored in the memory device 103.
  • the interface device 105 is used as an interface for connecting to the network.
  • an example of the recording medium 101 is a portable recording medium such as a CD-ROM, a DVD disk, or a USB memory.
  • examples of the secondary storage device 102 are a HDD (Hard Disk Drive) or a flash memory. Both the recording medium 101 and the secondary storage device 102 correspond to a computer-readable recording medium.
  • FIG. 3 illustrates an example of a functional configuration of the information processing device 10 according to an embodiment of the present invention.
  • a software product SW1 is installed in the information processing device 10.
  • the software product SW1 includes at least one component CP.
  • the component CP is software acting as a component constituting the software product SW1.
  • a component CP may be created for each function of the software product SW1.
  • Each component CP includes at least one module.
  • Each module constitutes at least one file.
  • the module may be, for example, an execution format file or a command file for generating a process, or a library that is an assembly of functions, or a resource file including setting information.
  • a module as a library includes a plurality of functions.
  • a module as an execution format file may also include at least one function.
  • the structure of the software product SW1 illustrated in FIG. 3 is merely one example.
  • the present embodiment may be applied to a software product having a different structure from that illustrated in FIG. 3 .
  • the information processing device 10 further includes an execution history writing unit 11 and a patch processing unit 12. These units are realized by processes that the CPU 104 is caused to execute by at least one program that has been installed in the information processing device 10. Furthermore, the information processing device 10 uses an execution history storage unit 13 and an install information storage unit 14.
  • the execution history storage unit 13 may be realized by using the secondary storage device 102 or a storage device (not illustrated) connected to the information processing device 10 via a network.
  • the execution history writing unit 11 stores execution history indicating that the check point has been executed, in the execution history storage unit 13.
  • a check point is a part that calls the execution history writing unit 11, which is embedded in advance in the source code of a module. Note that the execution history may be stored by using an output function of a versatile comment, without using the execution history writing unit 11.
  • the execution history writing unit 11 may be implemented as a function (hereinafter, "execution history write function"). In this case, in the module, the part calling the execution history write function corresponds to the check point.
  • a check point may be embedded in units of modules or in units of functions included in the module, and check points may be embedded in a plurality of parts in the function.
  • the execution history write function may be called at the side using the module, or the execution history write function may be called at the part that is first executed after the module has been loaded.
  • the execution history write function may be called at the beginning of the function or at the end of the function.
  • an execution history write function may be called for every path that is executed when a particular condition is satisfied.
  • the install information storage unit 14 stores identification information (hereinafter, "component ID") of the component CP, for each component CP of the software product SW1 installed in the information processing device 10.
  • component ID identification information
  • the patch processing unit 12 executes a process relevant to the application of a patch P1.
  • the patch processing unit 12 includes a referring unit 121, an application information acquiring unit 122, an application determination unit 123, a correction module acquiring unit 124, and a correction module application unit 125.
  • the referring unit 121 refers to the patch management server 20, as to whether there is a patch P1 for a component CP installed in the information processing device 10. In the present embodiment, a patch P1 is released for each component CP.
  • the application information acquiring unit 122 acquires an application information file f1 of a patch P1 when it is found that the patch P1 is released.
  • one patch P1 includes an application information file f1 and a correction module group ps1.
  • the application information file f1 is a file defining at least one condition (hereinafter, "application condition") for applying the patch P1, and information indicating the process to be executed when each application condition is satisfied.
  • the application information file f1 is one text file.
  • the correction module group ps1 is an assembly of one or more modules that have been corrected (hereinafter, "correction module"). For example, in a correction module for a library, a correction has been made with respect to some of the functions included in the correction module.
  • Each correction module is associated with identification information of the corresponding module (hereinafter, "module ID"), and stored in the patch management server 20.
  • module ID identification information of the corresponding module
  • module ID of the module and the module ID of the correction module of this module are the same. Therefore, by the module ID, it is possible to recognize the correspondence relationship between the module and the correction module of this module.
  • the application determination unit 123 determines whether to apply each correction module, according to whether the execution history stored in the execution history storage unit 13 satisfies one or more application conditions defined in the application information file f1 acquired by the application information acquiring unit 122.
  • To apply a correction module means to replace the module corresponding to the correction module, with the correction module.
  • the correction module acquiring unit 124 acquires (downloads), from the patch management server 20, the correction module or a correction module group including the correction module.
  • the correction module application unit 125 applies the correction module acquired by the correction module acquiring unit 124.
  • the location where the patch P1 is stored is not limited to the patch management server 20.
  • the patch P1 may be stored in a portable recording medium such as a CD-ROM, a DVD disk or a USB memory.
  • the patch processing unit 12 may refer to the recording medium set in the drive device 100 of the information processing device 10, and execute a process.
  • FIG. 4 is a flowchart of an example of processing procedures executed by the execution history writing unit 11.
  • the process indicated in FIG. 4 is started in response to a call for an execution history write function, at a check point embedded in a respective component included in the software product SW1.
  • identification information for identifying each check point (hereinafter, "check number") is specified. That is to say, to the execution history writing unit 11, the check number of the check point is reported.
  • the check number may be an identification name of the check point.
  • the check number of a check point in a certain function may include the function name of the function.
  • the check number of a check point of a certain module may include the file name of the module. That is to say, the rule of naming a check point may be determined appropriately.
  • the execution history writing unit 11 determines whether an entry of the reported check number is stored in the execution history storage unit 13 (step S101).
  • FIG. 5 illustrates an example of a configuration of the execution history storage unit 13.
  • the execution history storage unit 13 stores the number of times of execution, in association with the check number.
  • the number of times of execution is an example of execution history, which is the number of times the check point relevant to the check number has been executed.
  • step S101 it is determined whether there is an entry (record) including the reported check number.
  • the execution history writing unit 11 increments the number of times of execution in the entry by one (step S103).
  • the execution history writing unit 11 adds an entry corresponding to the check number, to the execution history storage unit 13 (step S102).
  • the value of the number of times of execution in the added entry is initialized to zero.
  • the history writing unit 11 executes step S103. Therefore, in this case, the value of the number of times of execution in the entry becomes one.
  • FIG. 6 is a flowchart of an example of processing procedures executed by the patch processing unit 12.
  • the process of FIG. 6 may be executed regularly or irregularly.
  • the process of FIG. 6 may be started in response to the activation of a particular module that is an execution format file, the loading of a particular module that is a library, or the execution of a particular function included in a particular module.
  • step S201 the referring unit 121 sends a reference request as to whether there is a patch P1, to the patch management server 20 (step S201).
  • the patch management server 20 returns a list of component IDs associated with the patch P1 stored in the patch management server 20. That is to say, a list of component IDs of the components CP for which the patch P1 is released, is returned.
  • the referring unit 121 determines whether there is a patch P1 for the component CP installed in the information processing device 10, based on whether the component ID stored in the install information storage unit 14 is included in the returned list of component IDs (step S202). That is to say, when the component ID stored in the install information storage unit 14 is included in the returned list of component IDs, the referring unit 121 determines that there is a patch P1 for the component CP installed in the information processing device 10.
  • a component ID included in both the returned list of component IDs and the install information storage unit 14 is hereinafter referred to as a "target component ID". There may be a plurality of target component IDs. Meanwhile, when the component ID stored in the install information storage unit 14 is not included in the returned list of component IDs, the referring unit 121 determines that there is no patch P1 for the component CP installed in the information processing device 10.
  • step S202 may be performed by the patch management server 20.
  • the reference request sent to the patch management server 20 in step S201 may include a list of component IDs stored in the install information storage unit 14.
  • the patch management server 20 may determine whether there is a patch P1 stored in association with any of the component IDs included in the list, and return the determination result to the information processing device 10.
  • the process of FIG. 6 ends.
  • target patch P1 a patch P1 (hereinafter, "target patch P1")
  • the application information acquiring unit 122 determines whether the application information file f1 of the target patch P1 has not yet been acquired (step S203). For example, it is determined whether the application information file f1 is not stored in the secondary storage device 102 in association with the target component ID.
  • step S204 is not executed, and the process proceeds to step S205. Note that even when the application information file f1 is acquired, there may be cases where the application information file f1 has been updated, and therefore it may be confirmed as to whether the application information file f1 has been updated. When the application information file f1 has been updated, the application information file may be acquired again.
  • the application information acquiring unit 122 acquires the application information file f1 of the target patch P1 from the patch management server 20 (step S204).
  • the application information file f1 of the target patch P1 is the application information file f1 stored in the patch management server 20 in association with the target component ID.
  • the application information acquiring unit 122 stores the acquired application information file f1 in the secondary storage device 102 in association with the target component ID.
  • FIG. 7 illustrates an example of a configuration of an application information file.
  • the application information file pf1 includes one or more entries. Each entry includes a check number, an application condition, a correction ID, a process group code, etc.
  • the check number is the check number having a number of times of execution that is focused on in the determination of whether the application condition is satisfied, among the number of times of execution stored in the execution history storage unit 13.
  • the application condition is the condition to which the correction module relevant to the correction ID is applied. More specifically, the application condition is the condition at which the process identified by the process group code in the entry is executed. N included in the application condition indicates the number of times of execution with respect to the check number of the entry.
  • the correction ID is the module ID of the correction module to be the application target, among the correction modules included in the correction module group ps1 of the target patch P1. In other words, it may be said that the correction ID is the module ID of the module that is the correction target, among the modules included in the information processing device 10.
  • the process group code is the sum of process codes of one or more processes to be executed, when the application condition is satisfied. In the present embodiment, the following values are defined as examples of process codes.
  • the process group code included in the application information file f1 is the sum of process codes.
  • the process code "0" is used only by itself, and does not constitute a process group code.
  • the order of executing the processes relevant to the respective process codes is in an ascending order starting from the process code of the smallest value. Therefore, for example, the process group code "3" indicates that the process of the process code “2" is to be executed after the process of the process code "1".
  • the process group code "5" indicates that the process of the process code "4" is to be executed after the process of the process code "1".
  • the application information file f1 does not have to be acquired based on the reference of whether there is a patch P1 by the referring unit 121. For example, when a new patch P1 is registered in the patch management server 20, the application information file f1 of the patch P1 may be distributed from the patch management server 20 to the information processing device 10.
  • the application determination unit 123 determines whether the application condition of each entry included in the acquired application information file f1 is satisfied (step S205). For example, with respect to the first entry in FIG. 7 , it is determined whether the number of times of execution of check number "WO01" is greater than or equal to one. With respect to the second entry, it is determined whether the number of times of execution of check number "xa001" is greater than or equal to one and less than or equal to 30. With respect to the third entry, it is determined whether the number of times of execution of check number "xb001" is zero. With respect to the fourth entry, it is determined whether the number of times of execution of check number "xc002" is greater than or equal to 60.
  • the number of times of execution of check number "yb002" is greater than or equal to one.
  • the number of times of execution of check number "z110" is zero. Note that the number of times of execution for a check number is the number of times of execution stored in the execution history storage unit 13 in association with the check number.
  • step S205 need not be executed in synchronization with step S204 (following step S204).
  • Step S205 may be executed at an arbitrary timing after step S204 is executed.
  • step S205 may be executed when the module as an execution format file is activated or terminated, or when a particular function has started or ended.
  • definition information indicating the timing may be generated and stored in the secondary storage device 102.
  • the definition information may be downloaded from the patch management server 20.
  • step S206 When there is no entry satisfying the application condition (NO in step S206), the process of FIG. 6 is ended.
  • the patch processing unit 12 executes a process indicated by the process group code of the entry (step S207).
  • the correction module acquiring unit 124 acquires, from the patch management server 20, a correction module group including the correction module relevant to the correction ID of the entry.
  • the correction module application unit 125 force-stops the process of loading the module relevant to the module ID, and applies the correction module.
  • a process for loading a certain module may be specified based on, for example, information indicating the relationship between the module and the process. More specifically, the information indicating the relationship between the module and the process, is information indicating the relationship between the module and the execution format file for generating a process of loading the module. This information may be created in advance and stored in the secondary storage device 102 or may be downloaded from the patch management server 20.
  • the correction module acquiring unit 124 acquires, from the patch management server 20, a correction module whose module ID is "p1002". In this case, the application of the correction module is not executed even when the process of loading the module relevant to the module ID ends.
  • the meaning of the second entry is that, when the check point of xa001 is greater than or equal to one and less than or equal to 30, there is a high possibility that the correction module having a module ID of "p1002" needs to be applied, and therefore the correction module is downloaded only for the sake of preparation. Therefore, in association with second entry, an entry having a correction ID of "p1002" and a process group code of "2" or "4" may be defined.
  • the correction module acquiring unit 124 acquires, from the patch management server 20, a correction module relevant to the correction ID of the entry.
  • the correction module application unit 125 waits for the process of loading the module relevant to the module ID to end, and then applies the correction module.
  • timing of ending a certain process may be detected as the process reports the end to the correction module application unit 125.
  • the timing of ending a process may be detected as the correction module application unit 125 monitors the state of each process via the OS (Operating System).
  • the timing of applying a correction module is after the end of the process of loading the module corresponding to the correction module.
  • options of the timings of applying the correction module may be provided in more fine units.
  • the unloading of the library being reported to the correction module application unit 125 may be set as an option of the timing of applying the correction module.
  • the report of unloading the library may be performed by the library if the library is able to make the report, or by the module on the side of unloading the library.
  • the start or the end of the function may be reported to the correction module application unit 125.
  • the start and the end of the function may be reported in the function, or may be reported on the side of calling the function.
  • the contents indicated in the sixth entry are that when the number of times of execution for the check number "z110" is zero, a correction module having a module ID of "p1004" is downloaded and applied.
  • This entry is based on the idea that if the check point relevant to the check number "z110" is not executed, it is estimated that a part having an exclusive relationship with this check point is executed. That is to say, when a part having an exclusive relationship with this check point is executed, the correction ID "p1004" is the module ID of the correction module to be applied.
  • module a a certain module acting as a library
  • module a includes a function A, and a function B and a function C that are called by the function A according to conditions.
  • module a it is assumed that a patch P1 includes a correction module C, in which a bug in the function C has been corrected.
  • the following entry may be defined.
  • Check number check number for check point at arbitrary part in function B
  • Correction ID Module ID of correction module C
  • Process group code 1 or 3 or 5
  • the correction module C may be applied.
  • the function B is called from the function A. Therefore, when function B is executed, it means that function A is executed.
  • function A it means that there is a possibility that the function C will be called according to the conditions in function A. Therefore, when function B is executed, there is meaning in applying the correction module C in which a correction has been made to function C.
  • the predetermined value is a value that is considered to be a sufficient execution track record.
  • the process performed on the patch management server 20 may be performed on the recording medium.
  • an indication of whether there is an execution track record may be stored as the execution history.
  • the history writing unit 11 loads the entry stored in the execution history storage unit 13 into the memory device 103, when the process to which the history writing unit 11 belongs is activated. Before executing step S101 of FIG. 4 , when the entry including the reported check number is stored in the memory device 103, the history writing unit 11 does not execute step S101 and onward.
  • the execution history storage unit 13 one is stored for every check point that is executed, and the number of times of execution is not updated according to subsequent executions. Accordingly, the access frequency to the execution history storage unit 13 may be reduced, and it is possible to reduce the possibility of the degradation in the performance due to writing in the execution history.
  • a value of a particular variable at a check point may be included in the execution history.
  • the application condition may be set with respect to the value of the variable. Accordingly, it is possible to determine whether to apply the correction module according to the execution status of the function.
  • a value of an argument of the function may be included in the execution history.
  • the application condition may be set for the value of an argument. Accordingly, it is possible to determine whether to apply the correction module according to the value of the argument of the function.
  • the data type of the argument is a data string
  • a value indicating the character type (full-width characters, half-width characters, and alphanumeric characters) of the character string may be included in the execution history.
  • the execution history may include a value indicating whether the application condition is satisfied, such as "ON” or "OFF".
  • a value indicating whether the application condition is satisfied such as "ON” or "OFF".
  • the execution history storage unit 13 stores "ON" with respect to a check number, it is determined that the application condition is satisfied.
  • This kind of execution history is effective in cases where the application of a correction module is to be avoided when a certain check point is executed. In this case, execution history indicating "OFF" is to be stored in the execution history storage unit 13 for the check point.
  • execution history is stored with respect to a function included in each module, and it is determined whether to apply a correction module according to whether the execution history satisfies a predetermined condition. Therefore, it is possible to determine whether to apply a correction module according to the execution status of the function.
  • a correction module which corresponds to a module including a function storing execution history indicating that execution has been performed, is the application target. Therefore, it is possible to reduce the possibility that the operations of the software product SW1 become unstable, due to the application of a correction module corresponding to a module that does not include an executed function, i.e., a module that is not used.
  • each check number and correction ID may include identification information of the software product and identification information of the component.
  • the execution history storage unit 13 is an example of a storage unit.
  • the application determination unit 123 is an example of a determination unit.
  • the information processing device 10 is an example of an application determination device.
  • the module is an example of an execution file.
  • the correction module is an example of a correction file.
  • an application determination method and an application determination device are provided, which are capable of determining whether to apply a correction according to the execution status of a program.
EP15152653.0A 2014-04-02 2015-01-27 Procédé et dispositif de détermination d'application Withdrawn EP2927808A1 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2014076071A JP6379599B2 (ja) 2014-04-02 2014-04-02 適用判定プログラム、適用判定方法、及び適用判定装置

Publications (1)

Publication Number Publication Date
EP2927808A1 true EP2927808A1 (fr) 2015-10-07

Family

ID=52434587

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15152653.0A Withdrawn EP2927808A1 (fr) 2014-04-02 2015-01-27 Procédé et dispositif de détermination d'application

Country Status (4)

Country Link
US (1) US20150286476A1 (fr)
EP (1) EP2927808A1 (fr)
JP (1) JP6379599B2 (fr)
CN (1) CN104978216A (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6766366B2 (ja) * 2016-02-05 2020-10-14 富士通株式会社 プログラム、情報処理方法および情報処理装置
JP6953947B2 (ja) * 2017-09-22 2021-10-27 コニカミノルタ株式会社 情報処理装置、ファームウェア更新プログラム

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040255290A1 (en) * 2003-06-12 2004-12-16 International Business Machines Corporation Installing fixes based on usage
EP1548586A2 (fr) * 2003-12-16 2005-06-29 Microsoft Corporation Détermination d'un ensemble maximal des mises à jour dépendantes de logiciel pour installation
WO2007105274A1 (fr) 2006-03-10 2007-09-20 Fujitsu Limited Dispositif et procede de selection de corrections applicables
US20080195693A1 (en) * 2005-10-25 2008-08-14 Huawei Technologies Co., Ltd. Method and Device for Monitoring and Upgrading Software in Device Management

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4050390B2 (ja) * 1998-06-18 2008-02-20 富士通株式会社 プログラム修正抽出適用システムおよび修正抽出適用プログラムを格納した記憶媒体
JP2001147815A (ja) * 1999-11-19 2001-05-29 Canon Inc 画像形成装置及び画像形成システム
JP3838243B2 (ja) * 2003-09-04 2006-10-25 ソニー株式会社 画像処理方法、および画像処理装置、並びにコンピュータ・プログラム
US7526771B2 (en) * 2003-11-12 2009-04-28 Ntt Docomo, Inc. Method and apparatus for configuring an application while the application is running
JP2005157509A (ja) * 2003-11-21 2005-06-16 Hitachi Ltd 通信端末
JP4539677B2 (ja) * 2007-04-23 2010-09-08 コニカミノルタビジネステクノロジーズ株式会社 画像形成装置、プログラム更新システム、プログラム更新方法およびプログラム更新プログラム
JP5081113B2 (ja) * 2008-09-17 2012-11-21 キヤノン株式会社 画像符号化装置及び画像復号装置、並びにそれらの制御方法
JP5200974B2 (ja) * 2009-02-05 2013-06-05 オムロンヘルスケア株式会社 管理装置、管理システム、および管理方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040255290A1 (en) * 2003-06-12 2004-12-16 International Business Machines Corporation Installing fixes based on usage
EP1548586A2 (fr) * 2003-12-16 2005-06-29 Microsoft Corporation Détermination d'un ensemble maximal des mises à jour dépendantes de logiciel pour installation
US20080195693A1 (en) * 2005-10-25 2008-08-14 Huawei Technologies Co., Ltd. Method and Device for Monitoring and Upgrading Software in Device Management
WO2007105274A1 (fr) 2006-03-10 2007-09-20 Fujitsu Limited Dispositif et procede de selection de corrections applicables

Also Published As

Publication number Publication date
CN104978216A (zh) 2015-10-14
JP2015197841A (ja) 2015-11-09
US20150286476A1 (en) 2015-10-08
JP6379599B2 (ja) 2018-08-29

Similar Documents

Publication Publication Date Title
WO2017071494A1 (fr) Procédé et appareil de déploiement d'application
CN101425018B (zh) 基于分段式的嵌入式固件升级方法及装置
US20170322796A1 (en) Device and method for updating firmware and firmware update system
US9038059B2 (en) Automatically targeting application modules to individual machines and application framework runtimes instances
US9201645B2 (en) Program distribution device, program distribution method, program distribution system, and storage medium
US9880836B2 (en) System and method for deploying a software program
CN111381858B (zh) 一种应用程序升级方法、服务器及终端设备
US20110041124A1 (en) Version Management System
US8918776B2 (en) Self-adapting software system
US10664290B2 (en) Application environment that implements native code functionality in progressive web applications
JP6198229B2 (ja) 並列化可能で信頼できるインストールのためのインストールエンジン及びパッケージフォーマット
US9916149B2 (en) Information processing apparatus, control method for information processing apparatus, and storage medium of program for executing control method
US7216344B2 (en) Side-by-side drivers
US8769521B2 (en) Calendar aware adaptive patching of a computer program
US9208320B2 (en) Software distribution system and software distribution method
CN110765394A (zh) so文件加载方法、装置、存储介质及终端设备
WO2016068845A1 (fr) Application dynamique d'une pièce à une bibliothèque partagée
EP2927808A1 (fr) Procédé et dispositif de détermination d'application
CN107463390B (zh) 一种软件升级方法及升级服务器
US9563416B2 (en) Information processing apparatus, method of controlling the same and non-transitory computer readable medium
CN110704025A (zh) 编码规范工具的生成方法和装置、存储介质、电子设备
US9742948B2 (en) Image forming apparatus and method for deleting application
US11023216B2 (en) Storage medium, information processing apparatus, and control method
CN111240752B (zh) 操作系统自适配方法及系统
JP6135193B2 (ja) プログラム実行装置、プログラム実行方法、及びプログラム実行プログラム

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

17P Request for examination filed

Effective date: 20160315

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

17Q First examination report despatched

Effective date: 20160511

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20180801